Static task
static1
Behavioral task
behavioral1
Sample
3192ee4fb89f1944e1d7b65652e6cbf0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3192ee4fb89f1944e1d7b65652e6cbf0N.exe
Resource
win10v2004-20240802-en
General
-
Target
3192ee4fb89f1944e1d7b65652e6cbf0N
-
Size
2.8MB
-
MD5
3192ee4fb89f1944e1d7b65652e6cbf0
-
SHA1
94a5ce0b4b3212af3f66e572bfa326136b16d240
-
SHA256
70d1c2a28cf5037cc013d41335abb15f5cd73434321c06a96f9243aced516981
-
SHA512
3eeed88b21449e13a438791f57ffff02c6b1767bbd41d8d525faca1ebf7e86dec0f06e11a54631066a0e3d0276e0c9e2897b1a1fa6555dc8455223a32ea4b12b
-
SSDEEP
6144:v3F/5OIDY4PAZbeG75QDvwxbmE7mkt7DWEHfyX+A6zcoKghx:PF/QIDY4ItV75nxqE7JWyQ+4o9h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3192ee4fb89f1944e1d7b65652e6cbf0N
Files
-
3192ee4fb89f1944e1d7b65652e6cbf0N.exe windows:5 windows x64 arch:x64
6d5cba4ea08624857ff2ddd23ca4449e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
shlwapi
PathRemoveBackslashA
wintrust
WinVerifyTrust
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
crypt32
CertGetNameStringA
kernel32
GetCommandLineW
lstrlenW
CreateMutexA
ReleaseMutex
lstrcatA
InitializeCriticalSectionAndSpinCount
FindFirstFileA
FindNextFileA
FindClose
GetDriveTypeA
IsDBCSLeadByte
GetCurrentProcess
GetCurrentProcessId
OpenProcess
VerSetConditionMask
VerifyVersionInfoA
GetModuleFileNameA
ExpandEnvironmentStringsA
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapSize
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExA
GetStringTypeW
LCMapStringW
GetFileType
GetACP
ExitProcess
WideCharToMultiByte
GetStdHandle
GetCommandLineA
GetModuleHandleExW
FreeLibraryAndExitThread
ResumeThread
ExitThread
CreateThread
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
RtlUnwindEx
RaiseException
EncodePointer
RtlPcToFileHeader
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
GetModuleFileNameW
GetComputerNameW
GetVersionExA
GetLocalTime
CreateFileA
GetPrivateProfileStringA
lstrcpynA
GetExitCodeProcess
InitializeSListHead
GetSystemTimeAsFileTime
WaitForSingleObject
SetLastError
CreateProcessA
lstrcmpA
FreeLibrary
GetProcAddress
LoadLibraryA
lstrlenA
MultiByteToWideChar
lstrcpyA
Sleep
WriteFile
CloseHandle
CreateFileW
SetFilePointer
lstrcmpiA
GetLastError
HeapFree
GetProcessHeap
HeapAlloc
GetCurrentThreadId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
VirtualAlloc
user32
GetWindowLongPtrA
SetCursor
LoadCursorA
MessageBoxA
EndDialog
wsprintfA
SetDlgItemTextA
IsWindow
PostMessageA
SetWindowLongPtrA
DialogBoxParamA
GetWindowTextW
GetDlgItem
ScreenToClient
LoadIconA
GetWindowTextA
SetWindowTextA
CheckDlgButton
GetParent
IsDlgButtonChecked
DrawMenuBar
GetSystemMenu
EnableMenuItem
SetWindowPos
GetWindow
MoveWindow
GetSystemMetrics
OffsetRect
EnableWindow
CharPrevA
ExitWindowsEx
CharNextA
GetWindowRect
SetPropA
RemovePropA
CallWindowProcA
DefWindowProcA
GetPropA
DrawFocusRect
FillRect
GetClientRect
GetFocus
DrawTextExA
DrawFrameControl
GetKeyState
SendMessageA
GetSysColor
GetSysColorBrush
GetDlgCtrlID
ShowWindow
IsIconic
SetForegroundWindow
GetLastActivePopup
FindWindowA
SendDlgItemMessageA
wsprintfW
gdi32
RestoreDC
DeleteObject
GetTextColor
CreateSolidBrush
SetBkMode
SaveDC
SetTextColor
SetBkColor
winspool.drv
EnumPrintersA
advapi32
OpenProcessToken
FreeSid
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
GetTokenInformation
LookupAccountSidA
EqualSid
AdjustTokenPrivileges
LookupPrivilegeValueA
AllocateAndInitializeSid
CreateProcessWithLogonW
ControlService
QueryServiceStatus
ChangeServiceConfigA
StartServiceA
OpenServiceA
OpenSCManagerA
CloseServiceHandle
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHCreateDirectoryExA
SHGetFolderPathA
SHGetSpecialFolderLocation
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
CoTaskMemFree
Sections
.text Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 63KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ